Sciweavers

3116 search results - page 600 / 624
» Recovering
Sort
View
135
Voted
AIM
2002
15 years 19 days ago
Computational Vulnerability Analysis for Information Survivability
The Infrastructure of modern society is controlled by software systems. These systems are vulnerable to attacks; several such attacks, launched by "recreation hackers" h...
Howard E. Shrobe
103
Voted
MANSCI
2007
86views more  MANSCI 2007»
15 years 19 days ago
Proper Conditioning for Coherent VaR in Portfolio Management
Value at Risk (VaR) is a central concept in risk management. As stressed by Artzner et al. (1999), VaR may not possess the subadditivity property required to be a coherent measure...
René Garcia, Éric Renault, Georges T...
87
Voted
BC
2004
113views more  BC 2004»
15 years 19 days ago
Mechanical model of the recovery from stumbling
Abstract. Several strategies have been described as a reaction to a stumble during gait. The elevating strategy, which tries to proceed with the perturbed step, was executed as a r...
A. Forner-Cordero, H. F. J. M. Koopman, Frans C. T...
BC
2004
94views more  BC 2004»
15 years 19 days ago
An adaptive neuro-fuzzy method ( ANFIS) for estimating single-trial movement-related potentials
Abstract. This study aims to recover transient, trialvarying evoked potentials (EPs), in particular the movement-related potentials (MRPs), embedded within the background cerebral ...
D. D. Ben Dayan Rubin, G. Baselli, Gideon F. Inbar...
120
Voted
BMCBI
2004
185views more  BMCBI 2004»
15 years 19 days ago
Linear fuzzy gene network models obtained from microarray data by exhaustive search
Background: Recent technological advances in high-throughput data collection allow for experimental study of increasingly complex systems on the scale of the whole cellular genome...
Bahrad A. Sokhansanj, J. Patrick Fitch, Judy N. Qu...